Computer Notes (MM)
Computer Notes (MM)
COMPUTER
USEFUL FOR ALL GOVERNMENT EXAMS
Unit Definition
Hz (Hertz) 1 cycle per second.
kHz (Kilohertz) 1,000 cycles per second.
MHz (Megahertz) 1 million cycles per second.
GHz (Gigahertz) 1 billion cycles per second.
Example: A CPU with 3.0 GHz speed executes 3 billion cycles per second.
Important Personalities
• Charles Babbage → Father of Computer.
• Alan Turing → Father of Modern Computer Science.
• Ada Lovelace → First Computer Programmer.
Generations of Computer
Generation Hardware Components Key Characteristics Examples
First Vacuum Tubes, Magnetic - Very large size, costly, consumed ENIAC, EDVAC,
Generation Drums high power. UNIVAC-1, IBM-
(1940–1956) - Very slow, limited storage. 701
- Used Machine Language (0s &
1s) only.
Second Transistors replaced vacuum - Smaller, faster, more reliable. IBM 1401, IBM
Generation tubes - Consumed less power, produced 7094, CDC 1604
(1956–1963) less heat.
- Cheaper and easier to maintain.
- Used Assembly Language and
early High-Level Languages
(COBOL, FORTRAN).
Third Integrated Circuits (ICs) - Hundreds of transistors on a IBM 360 Series,
Generation single chip. PDP-8, Honeywell
(1964–1971) - More reliable, faster, smaller, 6000
and cheaper.
- Supported Operating Systems
and multiprogramming.
- Used High-Level Languages (C,
BASIC, Pascal).
Fourth Microprocessors (VLSI – - Thousands of ICs integrated into IBM PC, Apple
Generation Very Large Scale one chip. Macintosh, Intel
(1971– Integration) - Very small in size, portable, 4004, Pentium
Present) affordable. series
- Graphical User Interfaces (GUI),
Networking, Internet.
- Programming in C, C++, Java,
.NET.
Fifth ULSI (Ultra Large Scale - Focus on Artificial Intelligence IBM Watson,
Generation Integration), AI Chips, (AI), Machine Learning (ML), Google DeepMind,
(Present & Quantum Computing Robotics, Expert Systems. Quantum
Beyond) Components - Natural Language Processing Computers
(NLP), Parallel Processing.
- Extremely powerful, compact,
energy efficient.
- Capable of self-learning and
decision making.
Types of Computers
Computers can be classified in different ways: based on type, based on purpose, and based on size.
1. Based on Type
Type Description Examples
Analog Work with continuous data (measure Thermometer-based systems,
Computers temperature, speed, voltage). Analog speedometers
Digital Work on discrete/binary data (0 & 1). PC, Laptop, Smartphones
Computers Most commonly used today.
Hybrid Combination of Analog + Digital (used Heart-rate monitoring systems,
Computers for both measuring & calculating). Petrol pumps
2. Based on Purpose
Purpose Description Examples
General Purpose Designed for multiple tasks (word Desktop PCs, Laptops
Computers processing, browsing, gaming).
Special Purpose Built for a specific task, more ATMs, Traffic control systems,
Computers efficient in that area. Weather forecasting machines
1. Input Unit
• Accepts data and instructions from the user.
• Converts input into machine-readable form (binary).
• Examples: Keyboard, Mouse, Scanner, Microphone.
3. Memory Unit
• Stores data, instructions, and results.
• Two main categories:
o Primary Memory → RAM, ROM (fast, temporary, small).
o Secondary Memory → Hard Disk, SSD (large, permanent, slower).
4. Output Unit
• Converts machine-processed results into human-readable form.
• Examples: Monitor, Printer, Speaker.
5. Storage Unit
• Works as long-term data storage.
• Includes Magnetic Disks (HDD), Solid-State Drives (SSD), Optical Discs (CD/DVD), Pen drives.
Impact Printers
(Strike ink ribbon against paper → noisy, cheaper, can print multiple copies with carbon paper)
Printer Key Points
Dot Matrix Printer Prints characters as patterns of dots; slow, noisy; cheap
(DMP) maintenance.
Line Printer Prints one line at a time; used for bulk printing.
Daisy Wheel Printer Prints like a typewriter; produces letter-quality print; very slow.
Non-Impact Printers
(Do not strike paper → quieter, faster, better quality)
2⃣ Pointing Devices
Device Key Points
Trackball Like an upside-down mouse; used in laptops, CAD applications.
Joystick Used for gaming, simulations, and controlling machines.
Light Pen Pen-like device for drawing/selecting on screen.
Stylus Used with touchscreens and tablets for handwriting/drawing input.
3⃣ Scanning & Recognition Devices
Device Key Points
Scanner Converts physical documents/images into digital form.
OCR (Optical Character Recognition) Converts printed text into editable digital text.
OMR (Optical Mark Recognition) Reads marked answers (used in OMR sheets/exams).
MICR (Magnetic Ink Character Used in banks to read cheques.
Recognition)
Barcode Reader Reads data stored in barcodes; used in retail &
inventory.
QR Code Scanner Reads Quick Response codes, faster & more secure.
4⃣ Biometric Devices
Device Key Points
Fingerprint Scanner Identifies based on fingerprint patterns.
Iris Scanner Uses unique patterns of the eye for authentication.
Facial Recognition Identifies person by facial features.
Voice Recognition Converts speech to text, also used for authentication.
Computer Memory
Computer memory is the storage space in a computer where data and instructions are stored for processing.
It is mainly classified into Primary Memory, Secondary Memory, and Cache Memory.
Secondary Permanent storage, slower than primary; not Hard Disk, SSD,
Memory directly accessed by CPU. CD/DVD, Pen Drive
Cache Memory High-speed memory between CPU & RAM; L1, L2, L3 Cache
stores frequently used instructions.
Primary Memory
Key Features
RAM vs ROM
Feature RAM ROM
Full Form Random Access Memory Read Only Memory
Nature Volatile (data lost on power off) Non-volatile (data retained)
Read/Write Read & Write Mostly Read-only
Speed Very fast Slower than RAM
Usage Temporary storage of data & instructions Permanent storage of firmware (BIOS,
during processing system software)
Examples DRAM, SRAM PROM, EPROM, EEPROM
Types of RAM
Type Full Form Key Features Use
SRAM Static RAM Faster, costlier, consumes more power; Cache Memory
stores data using flip-flops.
DRAM Dynamic RAM Slower, cheaper, needs refreshing; stores Main System
data using capacitors. Memory
SDRAM Synchronous DRAM Synchronized with CPU clock; faster than Modern PCs
normal DRAM.
DDR Double Data Rate Transfers data twice per clock cycle; variants Laptops, Desktops,
SDRAM SDRAM DDR1 → DDR5. Servers
Types of ROM
Type Full Form Key Features Use
PROM Programmable ROM Can be programmed once only; Embedded systems
permanent data storage.
EPROM Erasable Programmable Can be erased using UV light and Older firmware
ROM reprogrammed. updates
EEPROM Electrically Erasable Can be erased & reprogrammed BIOS chips
Programmable ROM electrically; slower.
Flash Advanced EEPROM Faster, allows block-wise erasing; Pen drives, SSDs,
Memory widely used today. Memory cards
Basic Units
Unit Symbol Relation
Bit b Smallest unit of data (0 or 1)
Nibble – 4 bits
Byte B 8 bits = 1 character
Higher Units
Unit Symbol Conversion
Kilobyte (KB) KB 1 KB = 1024 Bytes
Megabyte (MB) MB 1 MB = 1024 KB
Gigabyte (GB) GB 1 GB = 1024 MB
Terabyte (TB) TB 1 TB = 1024 GB
Petabyte (PB) PB 1 PB = 1024 TB
Exabyte (EB) EB 1 EB = 1024 PB
Zettabyte (ZB) ZB 1 ZB = 1024 EB
Yottabyte (YB) YB 1 YB = 1024 ZB
Key Points
• Bit (Binary Digit) → Smallest unit, value either 0 or 1.
• 1 Byte = 8 Bits = 1 Character (A, B, C, etc.).
• Nibble = 4 Bits = Half a Byte.
Easy trick to remember Memory Units Hierarchy: Brilliant New Boys Know Memory
Grows Too Powerful Every Zone Yes!
Computer Languages
A computer language is a system of communication used to write programs that tell a computer what to do.
It consists of syntax (rules) and semantics (meaning) that enable humans to interact with computers..
Classification of Software
1. System Software
2. Application Software
Categories by Usage
Category Description Examples
Freeware Free to use, but cannot modify. Adobe Acrobat Reader, Skype
Shareware Free trial, then paid. WinZip, Antivirus trials
Open Source Source code available, modifiable. Linux, Apache, Python
Proprietary Owned by companies, paid license. Windows, MS Office
Firmware Permanent software stored in ROM, controls hardware. BIOS
Operating System (OS)
An Operating System (OS) is a system software that acts as an interface between the user and computer
hardware. It manages resources, controls hardware, and provides services to applications.
Internet
The Internet is a global network of interconnected computers that communicate using standardized
protocols to share information, resources, and services.
Basics of Internet
• A network of networks, accessible worldwide.
• Based on the client-server model.
• Provides services like World Wide Web (WWW), Email, Online Banking, Social Media, Cloud
Storage.
History of Internet
Year Event
1969 ARPANET (Advanced Research Projects Agency Network) started in the USA –
considered the beginning of the Internet.
1971 First Email sent by Ray Tomlinson.
1983 TCP/IP adopted as standard protocol.
1989 WWW (World Wide Web) invented by Tim Berners-Lee.
1995 Internet commercialized; public access expanded.
2004 Rise of Web 2.0 (interactive web – social media, blogs).
onwards
Present Web 3.0 & 5G era – AI, IoT, Blockchain integrated.
Domain Name
• A Domain Name is the human-readable address of a website.
• Structured as: www.example.com
o www → Subdomain
o example → Domain name
o .com → Top-Level Domain (TLD)
Types of Domains
Structure:
https://www.example.com/page1
• https:// → Protocol
• www.example.com → Domain name
• /page1 → Specific path/page
Internet Protocols
Protocol Port Use
HTTP (HyperText Transfer Protocol) 80 Transfers web pages (not secure)
HTTPS (Secure HTTP) 443 Secure web browsing (SSL/TLS encryption)
FTP (File Transfer Protocol) 20/21 Transfers files between computers
SMTP (Simple Mail Transfer Protocol) 25 Sending emails
POP3 (Post Office Protocol v3) 110 Receiving emails (downloads & removes from
server)
IMAP (Internet Message Access 143 Receiving & managing emails (keeps on server)
Protocol)
DNS (Domain Name System) 53 Converts domain name ↔ IP address
SSH (Secure Shell) 22 Secure remote login
Telnet 23 Remote login (not secure)
Web Browser
A Web Browser is an application software that allows users to access and view websites.
Functions:
Examples:
Key Points :
Search Engine
A Search Engine is a software system that searches the World Wide Web and returns results based on user
queries.
Functions:
Examples:
• Google (1998, Larry Page & Sergey Brin) → Most used worldwide.
• Bing (2009, Microsoft).
• Yahoo! (1995).
• DuckDuckGo (2008, privacy-focused).
• Baidu (2000, China).
Key Points :
Email
Email (Electronic Mail) is a method of exchanging digital messages over the Internet.
Basics of Email
• Works on client-server model.
• Uses protocols: SMTP (Send), POP3 & IMAP (Receive).
• Requires a unique email address (e.g., [email protected]).
Structure of an Email
Part Explanation Example
To Main recipient(s) [email protected]
CC (Carbon Copy) Secondary recipients (visible to all) [email protected]
BCC (Blind Carbon Copy) Recipients hidden from others [email protected]
Subject Topic/heading of email “Exam Admit Card”
Body Main content/message “Please find attached…”
Attachments Files added with email PDFs, images, docs
Signature Sender’s contact info at end “Regards, Abhishek Rai”
Functions of Email
Function Explanation
Features of Email
Feature Explanation
Inbox Stores received emails.
Outbox/Sent Stores sent emails.
Drafts Stores unsent/half-written emails.
Spam/Junk Stores unwanted mails (ads, phishing).
Trash/Deleted Stores deleted mails (temporary).
Archive Stores old mails safely without deleting.
Attachments Allows adding files (Docs, PDFs, Images).
Signature Auto-added sender info (name, contact).
Search Helps find specific emails.
Networking
Networking is the practice of connecting multiple computers or devices to share resources, exchange data,
and communicate efficiently.
Network Topology
Network topology refers to the physical or logical arrangement of nodes (computers/devices) in a
network.
Networking Devices
Device Function Key Point / Example
Router Connects multiple networks, forwards data Internet router in
packets using IP addresses homes/offices
Switch Connects devices within a LAN, forwards data to Faster than hub
specific device using MAC address
Hub Connects devices in LAN, broadcasts data to all Cheap, but less efficient
Bridge Connects two LAN segments, filters traffic using Works at Data Link
MAC Layer
Gateway Connects two different networks using different Router often works as
protocols gateway
Modem Converts digital signals ↔ analog signals for DSL/ADSL modems
internet access
Access Point Extends Wi-Fi network; connects wireless devices Wi-Fi hotspots
(AP) to wired LAN
Repeater Amplifies/extends network signals Extends LAN/WAN
range
Firewall Filters network traffic for security Hardware/software-
based
Malware and Its Types
Malware (Malicious Software) refers to any program or code designed to disrupt, damage, steal, or gain
unauthorized access to computer systems.
Types of Hacking
Type Description Example
Ethical Hacking Authorized hacking to test security. Penetration testing
Cracking Breaking security for malicious purposes. Password cracking
Phishing Attack Fake websites/emails to steal credentials. Fake bank login page
Spoofing Pretending to be a trusted source (IP, email, Email spoofing
website).
Snooping Unauthorized monitoring of data. Packet sniffing
Denial of Service Flooding servers with traffic to crash them. Botnet attacks
(DoS/DDoS)
SQL Injection Malicious SQL code into database queries. Exploiting login
forms
Hackers & Their Types
Type of Hacker Hat Color Nature
White Hat Ethical Improves security (authorized)
Black Hat Malicious Illegal hacking for personal gain
Grey Hat Mixed Explores without permission, but not always harmful
Red Hat Vigilante Attacks black-hat hackers
Blue Hat External tester Security testing before product release
Script Kiddie Amateur Uses pre-made tools to hack without deep knowledge
Firewall – Functions
• Monitors traffic between internal network and external sources.
• Blocks unauthorized access while allowing legitimate communication.
• Types:
o Hardware Firewall → Physical device (router-based).
o Software Firewall → Installed program (Windows Firewall).
• Works on rules: Allow/Deny traffic based on IP, port, or protocol.
Computer Codes
Computer Codes are standardized systems of representing characters, numbers, and symbols in a form
understandable by computers (binary). These are essential for data storage, processing, and
communication.
Logic Gates
Logic Gates are the basic building blocks of digital circuits. They take one or more binary inputs (0 or 1)
and produce a single binary output.
Universal Gates
Gate Symbol Operation
NAND ¬(A∧B) Output is inverse of AND
NOR ¬(A∨B) Output is inverse of OR
Exclusive Gates
Gate Symbol Operation
0, 0 0 0 1 1 0 1
0, 1 0 1 1 0 1 0
1, 0 0 1 1 0 1 0
1, 1 1 1 0 0 0 1
Microsoft and Its Products
Microsoft is a global technology company founded in 1975 by Bill Gates & Paul Allen, best known for
its Operating Systems, Productivity Software, and Cloud Services.
MS Word Tabs
MS Word interface is divided into tabs on the ribbon. Each tab contains related commands grouped
together.
Home Tab
• Purpose: Text formatting and editing.
• Groups & Key Commands:
Group Commands
Clipboard Cut, Copy, Paste, Format Painter
Font Bold, Italic, Underline, Font size, Color, Highlight
Paragraph Alignment, Line spacing, Bullets, Numbering, Indent
Styles Predefined text formatting styles
Editing Find, Replace, Select
Insert Tab
• Purpose: Insert objects into document.
Group Commands
Pages Cover Page, Blank Page, Page Break
Tables Insert and format tables
Illustrations Pictures, Shapes, SmartArt, Charts, Icons
Links Hyperlink, Bookmark, Cross-reference
Header & Footer Page Number, Header, Footer
Text Text Box, WordArt, Drop Cap
Symbols Equations, Symbols
Design Tab
• Purpose: Document design and page style.
Group Commands
Document Formatting Themes, Colors, Fonts, Paragraph Spacing
Page Background Watermark, Page Color, Page Borders
Layout Tab
• Purpose: Page setup and arrangement.
Group Commands
Page Setup Margins, Orientation, Size, Columns, Breaks
Paragraph Indent, Spacing
Arrange Position, Wrap Text, Align, Group, Rotate
References Tab
• Purpose: Add references and citations.
Group Commands
Table of Contents Insert TOC
Footnotes Insert Footnote, Endnote
Citations & Bibliography Manage Sources, Insert Citation
Captions Insert Caption, Cross-reference
Index Mark Entry, Insert Index
Table of Authorities Insert Table of Authorities
Mailings Tab
• Purpose: For creating bulk letters and labels.
Group Commands
Create Envelopes, Labels
Start Mail Merge Letters, Email Messages
Write & Insert Fields Greeting Line, Address Block
Preview Results View merged document
Finish Complete mail merge
Review Tab
• Purpose: Proofing and reviewing.
Group Commands
Proofing Spelling & Grammar, Thesaurus, Word Count
Language Translate, Language settings
Comments Insert, Delete, Next/Previous
Tracking Track Changes, Reviewing Pane
Changes Accept/Reject changes
Protect Restrict Editing
View Tab
• Purpose: Change document view and layout.
Group Commands
Views Read Mode, Print Layout, Web Layout
Show Ruler, Gridlines, Navigation Pane
Zoom Zoom In/Out, One Page, Multiple Pages
Window New Window, Split, View Side by Side
Macros Record, Run Macros
MS Excel
Microsoft Excel is a spreadsheet software developed by Microsoft. It is part of the MS Office Suite and is
mainly used for data entry, analysis, calculations, charts, and financial reports.
Brief Overview
• Introduced: 1985 (Apple), 1987 (Windows).
• File Extension: .xls (old versions), .xlsx (new versions).
• Main Uses:
o Data entry & storage
o Mathematical & statistical calculations
o Data visualization (Charts, Graphs, Pivot Tables)
o Financial modeling & business reports
Home Tab
• Purpose: Basic editing & formatting.
Group Commands
Clipboard Cut, Copy, Paste, Format Painter
Font Bold, Italic, Underline, Font Size, Color
Alignment Left, Right, Center, Merge & Center, Wrap Text
Number Format cells as Currency, %, Date, Decimal
Styles Conditional Formatting, Cell Styles, Format as Table
Cells Insert, Delete, Format
Editing AutoSum, Fill, Sort, Filter, Find & Replace
Insert Tab
• Purpose: Add objects into worksheet.
Group Commands
Tables PivotTable, Table
Illustrations Pictures, Shapes, SmartArt, Icons
Charts Column, Line, Pie, Bar, Area, Combo
Sparklines Line, Column, Win/Loss
Filters Slicer, Timeline
Text Text Box, Header & Footer, WordArt
Symbols Equation, Symbol
Group Commands
Themes Themes, Colors, Fonts, Effects
Page Setup Margins, Orientation, Size, Print Area, Breaks
Scale to Fit Width, Height, Scale
Sheet Options Gridlines, Headings
Arrange Bring Forward, Send Backward, Align, Group
Formulas Tab
• Purpose: Insert and manage formulas.
Group Commands
Function Library Insert Function, AutoSum, Financial, Logical, Text, Date & Time, Lookup
Defined Names Name Manager, Define Name
Formula Auditing Trace Precedents, Trace Dependents, Error Checking
Calculation Calculate Now, Calculation Options
Data Tab
• Purpose: Manage and analyze data.
Group Commands
Get & Transform Data Import from text, web, database
Sort & Filter Sort Asc/Desc, Advanced Filter
Data Tools Text to Columns, Remove Duplicates, Data Validation, What-If Analysis
Forecast Forecast Sheet, Scenario Manager
Outline Group, Subtotal
Review Tab
• Purpose: Proofing and protecting.
Group Commands
Proofing Spelling, Thesaurus
Accessibility Accessibility Checker
Comments New Comment, Delete, Next/Previous
Protect Protect Sheet, Protect Workbook, Allow Edit Ranges
View Tab
• Purpose: Adjust worksheet view.
Group Commands
Workbook Views Normal, Page Break Preview, Page Layout
Show Ruler, Gridlines, Formula Bar, Headings
Zoom Zoom In/Out, 100%
Window New Window, Arrange, Freeze Panes, Split
Macros Record Macro, Use Relative References
Logical Functions
Function Syntax Use
IF =IF(A1>50,"Pass","Fail") Returns one value if condition is true, another if false
AND =AND(A1>50,B1<100) Returns TRUE if all conditions are true
OR =OR(A1>50,B1<100) Returns TRUE if any condition is true
NOT =NOT(A1>50) Reverses logical value
MS PowerPoint
Microsoft PowerPoint is a presentation software developed by Microsoft (part of MS Office Suite). It is
used to create slideshows, business presentations, educational content, and reports.
Brief Overview
• Introduced: 1987 (by Forethought Inc., acquired by Microsoft).
• File Extensions: .ppt (older versions), .pptx (latest versions).
• Purpose: Visual communication with text, images, charts, audio, and video.
Number System
The Number System is the method of representing numbers using different symbols (digits). Computers
use different number systems internally and for programming.
Cryptography
Cryptography is the science of securing communication by converting information into an unreadable
format (encryption) and then converting it back (decryption) using keys. It ensures confidentiality,
integrity, authentication, and non-repudiation in data communication.
Types of Cryptography
Type Description Key Points / Examples
Symmetric Key Same key is used for encryption & Fast, but key distribution is
Cryptography decryption. difficult.
Example: DES, AES, Blowfish
Asymmetric Key Uses two keys: Public Key Secure key exchange, slower
Cryptography (Public-Key) (encryption) & Private Key than symmetric.
(decryption). Example: RSA, ECC
Hash Functions One-way encryption; no decryption Used in password storage,
possible. digital signatures.
Example: MD5, SHA-1, SHA-
256
Hybrid Cryptography Combines symmetric + asymmetric Symmetric used for speed,
methods. asymmetric for key exchange.
Example: SSL/TLS (HTTPS)
Quantum Cryptography Uses principles of quantum mechanics Cutting-edge; nearly impossible
to secure data. to hack.
Example: Quantum Key
Distribution (QKD)
Applications of Cryptography
• Data Security → Protects sensitive data.
• Digital Signatures → Ensures authenticity of sender.
• Online Banking & E-Commerce → Secures transactions.
• Email Encryption → Protects communication.
• Blockchain & Cryptocurrencies → Uses cryptographic hashing.